Search Results - "Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)"

Refine Results
  1. 1

    Semantic data mining: A survey of ontology-based approaches by Dejing Dou, Hao Wang, Haishan Liu

    “…Semantic Data Mining refers to the data mining tasks that systematically incorporate domain knowledge, especially formal semantics, into the process. In the…”
    Get full text
    Conference Proceeding
  2. 2

    A syntactic approach for aspect based opinion mining by Chinsha, T. C., Joseph, Shibily

    “…Opinion mining or sentiment analysis is the process of analysing the text about a topic written in a natural language and classify them as positive negative or…”
    Get full text
    Conference Proceeding
  3. 3

    Using latent dirichlet allocation for topic modelling in twitter by Ostrowski, David Alfred

    “…Due to its predictive nature, Social Media has proved to be an important resource in support of the identification of trends. In Customer Relationship…”
    Get full text
    Conference Proceeding
  4. 4

    Performance analysis of Ensemble methods on Twitter sentiment analysis using NLP techniques by Kanakaraj, Monisha, Guddeti, Ram Mohana Reddy

    “…Mining opinions and analyzing sentiments from social network data help in various fields such as even prediction, analyzing overall mood of public on a…”
    Get full text
    Conference Proceeding
  5. 5

    Semantic description, discovery and integration for the Internet of Things by Sejin Chun, Seungmin Seo, Byungkook Oh, Kyong-Ho Lee

    “…To share and publish the domain knowledge of IoT objects, the development of a semantic IoT model based directory system that manages meta-data and…”
    Get full text
    Conference Proceeding
  6. 6

    Brill tagging on the Micron Automata Processor by Zhou, Keira, Fox, Jeffrey J., Ke Wang, Brown, Donald E., Skadron, Kevin

    “…Semantic analysis often uses a pipeline of Natural Language Processing (NLP) tools such as part-of-speech (POS) tagging. Brill tagging is a classic rule-based…”
    Get full text
    Conference Proceeding
  7. 7

    Challenge: Processing web texts for classifying job offers by Amato, Flora, Boselli, Roberto, Cesarini, Mirko, Mercorio, Fabio, Mezzanzanica, Mario, Moscato, Vincenzo, Persia, Fabio, Picariello, Antonio

    “…Today the Web represents a rich source of labour market data for both public and private operators, as a growing number of job offers are advertised through…”
    Get full text
    Conference Proceeding
  8. 8

    Semantic analysis of dialogs to detect social engineering attacks by Bhakta, Ram, Harris, Ian G.

    “…Cyberattackers often attack the weakest point of system, which is increasingly the people who use and interact with a computer-based system. A great deal of…”
    Get full text
    Conference Proceeding
  9. 9

    Intelligent malware detection based on file relation graphs by Lingwei Chen, Tao Li, Abdulhayoglu, Melih, Yanfang Ye

    “…Due to its damage to Internet security, malware and its detection has caught the attention of both anti-malware industry and researchers for decades. Many…”
    Get full text
    Conference Proceeding
  10. 10

    Partitioning of ontologies driven by a structure-based approach by Amato, F., De Santo, A., Moscato, V., Persia, F., Picariello, A., Poccia, S. R.

    “…In this paper, we propose a novel structure-based partitioning algorithm able to break a large ontology into different modules related to specific topics for…”
    Get full text
    Conference Proceeding
  11. 11

    Audio-based event detection in office live environments using optimized MFCC-SVM approach by Kucukbay, Selver Ezgi, Sert, Mustafa

    “…Audio data contains several sounds and is an important source for multimedia applications. One of them is unstructured Environmental Sounds (also referred to…”
    Get full text
    Conference Proceeding
  12. 12

    Pedagogical potentials of IEEE 802.11 WLAN to higher educational institutions: A case study of Nigerian based University by Hassan, Inuwa Musa, Khan, Habib Ullah, Zeitun, Rami, Mardini, Ghassan

    “…The research on `Pedagogical potentials of IEEE 802.11 WLAN to Nigerian based University' is an in depth study to evaluate the potentials of its implementation…”
    Get full text
    Conference Proceeding
  13. 13

    A distributed SVM method based on the iterative MapReduce by Xijiang Ke, Hai Jin, Xia Xie, Jie Cao

    “…Linear classification is useful in many applications, but training large-scale data remains an important research issue. Recent advances in linear…”
    Get full text
    Conference Proceeding
  14. 14

    Generating formal hardware verification properties from Natural Language documentation by Harris, Christopher B., Harris, Ian G.

    “…In the modern Application Specific Integrated Circuit (ASIC) design cycle, correctness properties for functional verification are usually created by an…”
    Get full text
    Conference Proceeding
  15. 15

    MOOCLink: Building and utilizing linked data from Massive Open Online Courses by Kagemann, Sebastian, Bansal, Srividya

    “…Linked Data is an emerging trend on the web with top companies promoting their own means of marking up data semantically, publishing and connecting data on…”
    Get full text
    Conference Proceeding
  16. 16

    Cascade object detection with complementary features and algorithms by De Cheng, Jinjun Wang, Xing Wei, Nan Liu, Shizhou Zhang, Yihong Gong, Nanning Zheng

    “…This paper presents a novel method of combining the object detection algorithms and the methods used for image classification aiming to further boosting the…”
    Get full text
    Conference Proceeding
  17. 17

    Chinese enterprise knowledge graph construction based on Linked Data by Qingliang Miao, Yao Meng, Bo Zhang

    “…Enterprise knowledge graph is crucial for both enterprises and their management agencies. However, enterprise knowledge graph construction faces several…”
    Get full text
    Conference Proceeding
  18. 18

    Cluster-oriented ensemble classifiers for intelligent malware detection by Shifu Hou, Lifei Chen, Tas, Egemen, Demihovskiy, Igor, Yanfang Ye

    “…With explosive growth of malware and due to its damage to computer security, malware detection is one of the cyber security topics that are of great interests…”
    Get full text
    Conference Proceeding
  19. 19

    Word Sense Disambiguation using WSD specific WordNet of polysemy words by Dhungana, Udaya Raj, Shakya, Subarna, Baral, Kabita, Sharma, Bharat

    “…This paper presents a new model of WordNet that is used to disambiguate the correct sense of polysemy word based on the clue words. The related words for each…”
    Get full text
    Conference Proceeding
  20. 20

    ICSC 2015 message from the program chairs by Kankanhalli, Mohan S., Tao Li, Wei Wang

    “…Welcome to the Proceedings of the Ninth IEEE International Conference on Semantic Computing (ICSC 2015) in Anaheim, California, USA. ICSC 2015 continues to…”
    Get full text
    Conference Proceeding